No, because a strong passphrase was chosen I was not able to recover
the WPA key. This is actually the kind of finding I like to get
during a wireless assessment.
On Jun 14, 2006, at 2:07 PM, Daren wrote:
So once you were able to get that was a dictionary attack successful?
I have collected over 1500 data packets yet kismac still says I need more?
On Jun 14, 2006, at 5:50 AM, Erik Winkler wrote:
For WPA dictionary attacks, you need to capture the authentication handshake between a valid client and the access point. I have done this for wireless assessments by sending a deauthentication packet targeted to the specific client BSSID. Once the client disconnects and reconnects to the AP, you have your WPA handshake.
On Jun 14, 2006, at 12:59 AM, Daren wrote:
So what is the min # of data packets before you can start a bruteforce wordlist attack?
PS has anyone successfully been able to break a wpa with a wordlist attack....using Kismac that is.